User Authentication with Passwords

The password authentication method is the easiest to implement, as it is set up by default. Password authentication uses the /etc/passwd or /etc/shadow file on a Unix system, depending on how the passwords are set up.

To enable password authentication, make sure that the AllowedAuthentications keyword of the /etc/ssh2/sshd2_config and /etc/ssh2/ssh2_config configuration files contain the argument password:

AllowedAuthentications password

Other authentication methods can be listed in the configuration files as well.